scispace - formally typeset
Proceedings ArticleDOI

Wave (let) decide choosy pixel embedding for stego

TLDR
This paper proposes a modern steganographic technique with Integer Wavelet transform (IWT) and double key to achieve high hiding capacity, high security and good visual quality.
Abstract: 
Steganography is used to hide a secret message within a cover image, thereby yielding a stego image such that even the trace of the presence of secret information is wiped out. The purpose of steganography is to maintain secret communication between two users. Steganography has several technical challenges namely high hiding capacity and imperceptibility. In this paper we propose a modern steganographic technique with Integer Wavelet transform (IWT) and double key to achieve high hiding capacity, high security and good visual quality. Here cover image is converted in to wavelet transform co-efficients and the coefficients are selected randomly by using Key-1 for embedding the data. Key-2 is used to calculate the number of bits to be embedded in the randomly selected coefficients. Finally the Optimum Pixel Adjustment Process (OPAP) is applied to the stego image to reduce the data embedding error.

read more

Citations
More filters
Journal ArticleDOI

Phase for Face saving-a multicarrier Stego

TL;DR: The following work focuses on modulating the signal through QAM, a highly bandwidth efficient modulation technique and subsequently embedding the payload on the modulated signal during the process of signal mapping, and evaluates the system's performance via BER for different embedding levels.
Journal ArticleDOI

Horse Riding & Hiding in Image for Data Guarding

TL;DR: This method gives highly secured and high capacity steganography by using knight's tour for random walk inside the file and using modified LSB substitution and readjustment procedure the mean square error has been reduced.
Proceedings ArticleDOI

Multi secure and robustness for medical image based steganography scheme

TL;DR: A viable steganography technique using Integer Wavelet Transform (IWT) to protect the MRI medical image into a single container image and the quality parameters are improved with acceptable PSNR compared to the existing algorithms.
Journal ArticleDOI

Hide and seek in silicon - Performance analysis of Quad block Equisum Hardware Steganographic systems

TL;DR: This paper has proposed image steganographic architecture which employs data embedding technique in square sized cover image blocks that are stored in internal/external memory of a processor and reconfigurable hardware.
Proceedings ArticleDOI

High security image steganography using IWT and graph theory

TL;DR: A Color image steganography in transform domain is proposed, which shows good imperceptibility, High capacity and Robustness and Random selection of wavelet coefficients is based on the graph theory.
References
More filters
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI

Hiding data in images by simple LSB substitution

TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

Hide and seek: an introduction to steganography

TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Related Papers (5)